Edge-computing-enabled smart cities: A comprehensive survey

LU Khan, I Yaqoob, NH Tran… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Recent years have disclosed a remarkable proliferation of compute-intensive applications in
smart cities. Such applications continuously generate enormous amounts of data which …

Performance evaluation metrics for cloud, fog and edge computing: A review, taxonomy, benchmarks and standards for future research

MS Aslanpour, SS Gill, AN Toosi - Internet of Things, 2020 - Elsevier
Optimization is an inseparable part of Cloud computing, particularly with the emergence of
Fog and Edge paradigms. Not only these emerging paradigms demand reevaluating cloud …

A survey on the computation offloading approaches in mobile edge/cloud computing environment: a stochastic-based perspective

A Shakarami, M Ghobaei-Arani, M Masdari… - Journal of Grid …, 2020 - Springer
Fast growth of produced data from deferent smart devices such as smart mobiles, IoT/IIoT
networks, and vehicular networks running different specific applications such as Augmented …

A survey on NoSQL stores

A Davoudian, L Chen, M Liu - ACM Computing Surveys (CSUR), 2018 - dl.acm.org
Recent demands for storing and querying big data have revealed various shortcomings of
traditional relational database systems. This, in turn, has led to the emergence of a new kind …

[HTML][HTML] Advancing cloud security: Unveiling the protective potential of homomorphic secret sharing in secure cloud computing

S Ali, SA Wadho, A Yichiet, ML Gan, CK Lee - Egyptian Informatics Journal, 2024 - Elsevier
Cloud computing security and data protection are becoming increasingly critical as its use
increases. The research we present demonstrates how undercover sharing techniques and …

Machine learning-based scaling management for kubernetes edge clusters

L Toka, G Dobreff, B Fodor… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Kubernetes, the container orchestrator for cloud-deployed applications, offers automatic
scaling for the application provider in order to meet the ever-changing intensity of …

RSM analysis based cloud access security broker: a systematic literature review

S Ahmad, S Mehfuz, F Mebarek-Oudina, J Beg - Cluster Computing, 2022 - Springer
Abstract A Cloud Access Security Broker (CASB) is a security enforcement point or cloud-
based software that is placed between cloud service users and cloud applications of cloud …

Edge intelligence—research opportunities for distributed computing continuum systems

VC Pujol, PK Donta, A Morichetta… - IEEE Internet …, 2023 - ieeexplore.ieee.org
Edge intelligence and, by extension, any distributed computing continuum system will bring
to our future society a plethora of new and useful applications, which will certainly …

Horizontal and vertical scaling of container-based applications using reinforcement learning

F Rossi, M Nardelli, V Cardellini - 2019 IEEE 12th International …, 2019 - ieeexplore.ieee.org
Software containers are changing the way distributed applications are executed and
managed on cloud computing resources. Interestingly, containers offer the possibility of …

A survey of data center consolidation in cloud computing systems

L Helali, MN Omri - Computer Science Review, 2021 - Elsevier
Virtualization technology is the backbone of cloud systems, the fastest-growing energy
consumers, globally. It holds an imperative position in the resource management area by …